Summary
Overview
Work History
Education
Skills
Certification
Timeline
Generic

Lindsey Skidmore

Cincinnati,OH

Summary

A highly dedicated cybersecurity analyst with over four years of experience in incident response, bringing a strong passion for tackling complex challenges and a deep understanding of threat landscapes and defensive strategies. Known for the ability to rapidly identify security breaches and implement effective, timely solutions. A collaborative team player who adapts seamlessly to evolving security environments, contributing strong analytical thinking and exceptional problem-solving skills.

Overview

7
7
years of professional experience
1
1
Certification

Work History

SOC Analyst

Vigilant Cyber Security
08.2024 - Current
  • Identified strategic detection and tuning opportunities to enhance SOC visibility, strengthen coverage against emerging TTPs, and support continuous improvement of clients' overall security posture.
  • Designed Snort detections capable of identifying ePHI data transfers and download activity, strengthening data-loss visibility and regulatory compliance efforts for clients in the financial services sector.
  • Implemented a comprehensive lab for the SOC to support hand-on analyst training, develop OSINT tradecraft, and conduct controlled dark web monitoring and research.
  • Severed as senior escalation point for complex incidents requiring advanced analysis and situational awareness.
  • Managed onboarding. policy development, deployment, and ongoing management of Endpoint Detection and Response tooling.
  • Led initiative to reorganize my team into specialized industry-focus squads, enabling more targeted threat research, tailored reporting, and deeper visibility into sector-specific risks and adversary activity.
  • Engaged directly with clients to provide threat hunt briefings, clarify detection activity, monthly security business reviews, and ensure they received targeted, relevant guidance based on their sector's current threat landscape.
  • Organized and execute end-to-end threat and vulnerability notifications ensure internal teams and clients received timely, high-fidelity information to drive effective and informed response efforts.

Cyber Security Analyst - Incident Response

CDK Global
05.2021 - Current
  • Identified and lead remediation of vulnerabilities that impacted company’s infrastructure with a CVSS 3.x score of 8.0 or higher.
  • Conducted threat hunting and research to ensure alignment with security controls, security awareness training, and provide updates to the security team.
  • Proposed source, technique/access, and destination containment strategy for AWS resources.
  • Spearheaded forensic, network, and malware analysis during the incident response process and extracted IOAs and IOCs for curating and/or enriching correlations in SIEM to identify and contain further actions on objectives.
  • Authored security incident reports outlining overview of key incident details, actions to contain the incident, and recommendations for improving security controls to aid stakeholders understanding of the incident, its implications, and the proposed steps to mitigate associated risks and strengthen organizations security posture.
  • Consulted with and supported security engineering team SIEM initiatives including prioritizing, onboarding new data sources, and recommending correlations and thresholds to improve alert fidelity.
  • Collaborated across multiple teams to unify our incident response process through coordinating communication and meetings with key stakeholders, identifying problem areas, tracking progress, creating priority models for incident classifications, and establishing and maintaining a secure repository.
  • Experience with network security monitoring and tooling for pcap analysis, port/protocol/ scanning, vulnerability scanning, firewalls, VPN, and access control

Business Security Analyst Co-op

CDK Global
05.2020 - 09.2020
  • Identified inefficiencies in SPLUNK correlation searches and recommended improvements for lookups
  • Investigated potential security breaches by thorough analysis of relevant logs, network traffic, system alerts and other IOCs to determine scope and impact.
  • Documented security findings in ticketing systems including timeline of events, affected systems and/or data, investigative steps taken, hypothesis regarding nature of the event, potential threat actor involved, and IOCs added to detection tools.
  • Steered cyber security awareness month initiative and training based on the company’s residing sector and utilizing participation and performance metrics to track employee progress and highlight areas requiring improvements.
  • Dynamic malware analysis through various sandboxing tools and enriched detections tools with extracted IOCs and behavior anomalies

Information Security Co-op

The Cincinnati Insurance Agencies
05.2019 - 12.2019
  • Maintained organizational security posture through PHISHING reporting and awareness.
  • Trained with Red Team to strengthen personal offensive security skills.
  • Participated in monthly disaster recovery exercises, supplying documentation to ensure Tier 1 applications met time and efficiency expectations.
  • Worked with Compliance team to improve documentation process for annual audits.
  • Created and managed knowledge base to offer staff and customers immediate informational access security awareness training.

Infrastructure Security Co-op

Projetech Inc
09.2018 - 12.2018
  • Collaborated with Security Team on SIEM solution project: scripted procedure to establish automated secure third-party logging and notifications.
  • Maintained network, system and data availability and integrity through proactive maintenance and upgrades.
  • Discovered vulnerabilities, suggested necessary actions, and verified the effectiveness of current and freshly implemented security controls.
  • Monitored computer virus reports to determine when to updated virus protection systems
  • Developed security awareness training program.

Education

B.S. - Information Technology/Cybersecurity

University of Cincinnati
Cincinnati, OH
05.2021

Skills

  • MITRE ATT&CK, Threat Intelligence Research and Development
  • Endpoint Detection and Response - Crowdstrike and Defender
  • SIEM technologies - SPLUNK, AlienVault, DEVO
  • Vulnerability management and notifications
  • Malware analysis and incident response
  • AWS cloud practitioner and Azure experience
  • Security testing with Kali Linux
  • Network security monitoring using Snort
  • Skilled in packet capture and analysis techniques
  • Virtualization tools – VMWare, VirtualBox, hypervisor

Certification

  • CompTIA Security+
  • AWS Certified Cloud Practitioner

Timeline

SOC Analyst

Vigilant Cyber Security
08.2024 - Current

Cyber Security Analyst - Incident Response

CDK Global
05.2021 - Current

Business Security Analyst Co-op

CDK Global
05.2020 - 09.2020

Information Security Co-op

The Cincinnati Insurance Agencies
05.2019 - 12.2019

Infrastructure Security Co-op

Projetech Inc
09.2018 - 12.2018

B.S. - Information Technology/Cybersecurity

University of Cincinnati